Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. dectalk-tts
  4. ›
  5. CVE-2024-31206

CVE-2024-31206: dectalk-tts Uses Unencrypted HTTP Request

April 4, 2024 (updated April 5, 2024)

In dectalk-tts@1.0.0, network requests to the third-party API are sent over HTTP, which is unencrypted. Unencrypted traffic can be easily intercepted and modified by attackers. Anyone who uses the package could be the victim of a man-in-the-middle (MITM) attack.

Theft

Because dectalk-tts is a text-to-speech package, user requests are expected to only contain natural language. The package README warns that user input is sent to a third-party API, so users should not send sensitive information regardless.

But if users ignore the warnings and send sensitive information anyway, that information could be stolen by attackers.

Modification

Attackers could manipulate requests to the API. However, the worst a modified request could do is return an incorrect audio file or bad request rejection.

Attackers could also manipulate responses from the API, returning malicious output to the user. Output is expected to be a wav-encoded buffer, which users will likely save to a file. This could be a dangerous entrypoint to the user’s filesystem.

References

  • github.com/JstnMcBrd/dectalk-tts
  • github.com/JstnMcBrd/dectalk-tts/blob/b3e92156cbb699218ac9b9c7d8979abd0e635767/src/index.ts
  • github.com/JstnMcBrd/dectalk-tts/commit/3600d8ac156f27da553ac4ead46d16989a350105
  • github.com/JstnMcBrd/dectalk-tts/issues/3
  • github.com/JstnMcBrd/dectalk-tts/pull/4
  • github.com/JstnMcBrd/dectalk-tts/security/advisories/GHSA-6cf6-8hvr-r68w
  • github.com/advisories/GHSA-6cf6-8hvr-r68w
  • nvd.nist.gov/vuln/detail/CVE-2024-31206

Code Behaviors & Features

Detect and mitigate CVE-2024-31206 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 1.0.0 before 1.0.1, version 1.0.0

Fixed versions

  • 1.0.1

Solution

Upgrade to version 1.0.1 or above.

Impact 8.2 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-300: Channel Accessible by Non-Endpoint
  • CWE-319: Cleartext Transmission of Sensitive Information
  • CWE-598: Use of GET Request Method With Sensitive Query Strings

Source file

npm/dectalk-tts/CVE-2024-31206.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:54 +0000.